Challenges
Search…
⌃K
Introduction
InsecureShop Challenges
Hardcoded Credentials
Insufficient URL Validation
Weak Host Validation
Arbitrary Code Execution
Intent Redirection (Access to Protected Components)
Unprotected Data URIs
Theft of Arbitrary files from LocalStorage
Using Components with Known Vulnerabilities
Insecure Broadcast Receiver
AWS Cognito Misconfiguration
Insecure use of FilePaths in FileProvider
Use of Implicit intent to send a broadcast with sensitive data
Intercepting Implicit intent to load arbitrary URL
Insecure Implementation of SetResult in exported Activity
Insecure Content Provider
Lack of SSL Certificate Validation
Insecure Webview Properties Enabled
Insecure Data Storage
Insecure Logging
Powered By GitBook

Using Components with Known Vulnerabilities

The InsecureShop app contains a vulnerable library that allows any third-party app on the device to steal any file from the app's local storage and send this file to the arbitrary domain.
Hint: Checkout the Hackerone disclosures. One of the publicly disclosed report on Hackerone talks about this vulnerability and how this can be exploited.
InsecureShop Challenges - Previous
Theft of Arbitrary files from LocalStorage
Next - InsecureShop Challenges
Insecure Broadcast Receiver
Last modified 1yr ago
Copy link